Competitive Intelligence Competitive Intelligence and Espionage Team B University of Phoenix Business Law 415 Brien Walton April 10, 2006 1 Competitive Intelligence Table of Contents Table of Contents 2 Thesis Statement 4 Introduction 4 Agency Law 4 Duties of Principals to Agents 5 Contractual Liability 5 Partial Disclosed, Disclosed and Undisclosed Principal 6 Liability for Torts 6 Liability for Crimes 6 Liability for Torts/Crimes of Officers and Directors 7 Business Entities 7 Sole Proprietorship 7 Partnerships 7 Corporations 8 Limited Liability Companies 8 Limited Liability Partnerships 9 Franchising 9 E-Business and the Global Legal Environment Entrepreneurs 9 9 Partnerships 10 Corporations 10 Limited Liability Companies and Partnerships 10 2 Competitive Intelligence Franchising Competitive Intelligence and Espionage 11 11 Trade Secrets 11 Theft 12 Fraud 12 Online Sabotage 12 Telephone and Email 13 Inside Information 13 Camera Phones 13 Wiretaps 14 Surveillance 14 Impacts 15 Positive Aspects 15 Negative Ramifications 15 Protection and Legal Retribution 15 Legislation 15 Lawsuits 16 Conclusion 16 References 17 3 Competitive Intelligence 4 Competitive Intelligence and Espionage Thesis Statement To explain competitive intelligence and espionage in business including how it relates to the application of agency law, whether it distinguishes between the various business entities, and how it impacts e-business in the global legal environment. Introduction Competitive intelligence (CI) and corporate espionage are methods used by businesses to sharpen the competitive edge. CI is the legal gathering of information about competitors using public sources like annual reports, company websites, and securities filings (Samborn, 2004). Companies use this data for strategic planning, product development, and new market development. At the other extreme, corporate espionage is the illegal gathering of private data or trade secrets using computer fraud, wire or phone tapping, or breach of confidential relationships (Marrs, 2000). This paper will examine CI and corporate espionage in business, their effects on agency law and different types of business entities, the impact on e-business in the global legal realm, and will present legal remedies and legislation created to protect intellectual property. Agency Law Agency law is an area of law dealing with a contractual set of relationships in which an agent is authorized to act on behalf of another (principal). Almost every one has been involved in an agency type contract at one time or another, whether written or oral. Some examples of agency contracts would be lawyer-client, employer-employee, or even friend-friend, if one friend asks another to perform an act in his or her behalf. Barnes, Dworkin, and Richards state “Agency law especially focuses on the relations between principals and agents and the third persons with whom agents deal in making contracts on behalf of principals.” (2003). Competitive Intelligence 5 Duties of principals to agents The four common-law duties that a principal owes an agent are: Perform the agency contraction Compensate the agent Reimburse the agent for expenses Indemnify the agent for loss suffered resulting from the agency The principal has the duty to abide by the terms of the agency contract. If the principal wrongfully breaks the contract, the agency is terminated, although the principal will still be liable for damages to the agent. If an agent is not performing according to the agreement or is guilty of wrongdoing, the principal may justifiably terminate the agency with no liability on the principal’s part. When the agent has performed his or her part of the agreement, the principal has the duty to pay the agreed amount of money. Contractual liability The concept of contractual liability is used in business to obtain a contract with a company when both parties foresee large earnings. This concept also allows one company to enter into a contract with little or no liability. “It is common in construction and other agreements (written or oral) for one party to "assume" the liability of another. This is sometimes referred to as a "hold harmless" agreement. The extent to which one holds another harmless varies from contract to contract, job to job, etc. To assume the liability of another, regardless of extent, is a voluntary undertaking which increases exposure to loss. A standard Commercial General Liability policy does cover this additional exposure subject to certain exclusions.” (Lewis-Chester, 2000) Competitive Intelligence 6 Partial disclosed, disclosed and undisclosed principal Within agency law, a principal authorizes an agent to enter into a contractual agreement with third parties. The authorization of the agent makes him or her liable under the contract. “The imposition of such liability depends upon whether the agent is classified as fully disclosed, partially disclosed or undisclosed” (Cheeseman, 2004). The variance between fully, partially, and undisclosed principal, is slight; each of extreme importance. The identity of the principal may or may not have been released to the third party. Therefore, based on the type of agency, the liability of the contract will change. “The liability in a fully disclosed agency would fall upon the principal; however, in a partially disclosed or undisclosed agency both the principal and the agent are liable.” (2004). Liability for torts According to Cheeseman, a tort is a wrong (2004). There are three categories: (1) intentional torts, (2) unintentional torts (negligence), and strict liability. A liability is a legal responsibility, duty, or obligation (2004). The responsibility, duty, or obligation may be expressed or implied from a contract and can be enforced by law. Liability for crimes In order for an organization to be held legally responsible for crimes, illegal activities occur on the property resulting in criminal acts being committed which may have no actual intent. These crimes are as broad as “obstructing a highway, operating a gambling house on corporate premises, usury, air, and water pollution.” (Bailen, n.d.). In earlier times, corporate liability was difficult to establish. However, approaches of this kind carry various well-known limitations. Presently, statutes label a corporation's indiscretions. Crimes have an immense effect on Competitive Intelligence 7 shareholders and present a sinister view of the company's reputation. Corporations convicted of crimes are responsible for compensation damages and/or imprisonment of employees. Liability for torts/crimes of officers and directors In agency law, the liability for torts rests squarely on the shoulders of the employer. “Respondeat superior” is the Latin term for the legal doctrine of “let the master answer.” In the event that officers of the company commit a crime while in the employ of the company, the company holds the liability if the company authorized the officers to commit the deed of that crime. Even though the company is usually liable, this does not mean that the employee is not responsible for his or her own actions. Usually if a company is sued, the employee is also sued. More often than not, the companies pay the damages because they can afford to do so more readily than the employee. Business Entities Sole proprietorship A sole proprietorship is a business operated by a person as his or her own personal property and is considered an extension of the individual owner (Cheeseman, 2004). The individual owner can assume a business name such as a “Doing Business As.” The sole proprietor may also hire employees as personal employees of the individual. As the sole proprietor, the individual assumes the majority of all liability. Partnerships Partnerships can be formed to allow a person to make gifts of partnership interests to family members while maintaining control over the underlying assets. Partnerships do not pay taxes and do not have to make special elections in order to be taxed individually on partnership profits. Competitive Intelligence 8 Partnership interests are usually subject to transfer restrictions that can justify even more significant valuation discounts for gift-tax purposes (Rushforth, 1999). Corporations Corporations are frequently used to shelter personal assets from the liabilities of a business. Gifting stock in a family corporation is a relatively simple way to make gifts. Gifts of minority interests and non-voting stock are not only entitled to valuation discounts but they entitle the recipient to retain control of the corporation and its assets. Corporations are separate taxpayers ("C corporations") unless their shareholders elect to be taxed individually on their pro rata share of corporate profits ("S corporations")(Rushforth, 1988-1999). Limited liability companies A business ownership that incorporates or combines features of a corporation and partnership structures is known as a limited liability company. The advantages of a limited liability company are liability protection, flexible profit distribution, no minutes, and flow through taxation. Zahorsky comments: Owners of a LLC have the liability protection of a corporation. A LLC exists as a separate entity much like a corporation. Members cannot be held personally liable for debts unless they have signed a personal guarantee. Limited liability companies can select varying forms of distribution of profits. Unlike a common partnership where the split is 50-50, LLC have much more flexibility. The LLC business structure requires no corporate minutes or resolutions and is easier to operate. All your business losses, profits, and expenses flow through the company to the individual members. You avoid the double taxation of paying corporate tax and individual tax. Generally, this will be a tax advantage, but circumstances can favor a corporate tax structure. (2006) Competitive Intelligence 9 Limited liability partnerships A limited liability partnership (LLP) is a relatively new way to establish a business so that the partners in the business can freely participate in the management of the business without exposing themselves to personal liability. The partners’ liability is limited to the amount each has invested in the business. The LLP is a separate legal entity and allows the partners the flexibility to organize their management structure as a traditional partnership. LLP's are only available in certain states and, in some states, are only available to attorneys and accountants. Franchising When franchising a business, businesses must abide by federal and state guidelines. “You must provide prospective franchisees with a Uniform Franchise Offering Circular ("UFOC"), a government mandated document that has 23 specific disclosure items” (Story, n.d.). An operating manual is required to provide extensive training and guidelines toward achieving success. Three years of financial statements are needed and these statements are usually audited. Solicitation, sales, and support are needed; therefore, a strong infrastructure should be put in place. Retaining a lawyer who specializes in franchising is strongly advised (Story, n.d.). E-Business and the Global Legal Environment Entrepreneurs “The allure of owning your own business is undeniable: creating the joy of your dreams, greater control of your time and potentially more money” (Bamber, 2006). The entrepreneur that desires to start an e-business would have the same desires and goals except on a global scale. The World Wide Web (www) for the novice entrepreneur makes them a target for a global onslaught of online fraud and security risks. Therefore, due consideration is needed to protect the Competitive Intelligence 10 entrepreneurs’ intellectual properties. The legal protections of copyrights, trade, or service marks can solidify the new ventures and protect the entrepreneur from common pitfalls. Partnerships E-business relies on partnerships and thrives on collaboration, use of common technological platforms, and business processes. The need to collaborate and form new partnerships to realize the benefits of e-business may be at odds with competitive organization structures and mindsets (Mitchell, 1999). Technology is continuing to grow and e-business will continue to play different roles in the e-business environment. Corporations E-business is emerging as a priority to many corporations which have established departments to develop potential. The Cahners In-Stat Group reports that large corporations have almost one million remote office locations globally (as cited in Many U.S. Corporations Going Mobile, 2000). Websites provide access to customers in markets all over the world that were once out of reach. To protect online information, strong encryption and security measures should be in place. Limited liability companies and partnerships Limited liability companies and limited liability partnerships, like corporations, participate in e-commerce on a global scale. Products and services are advertised on company websites and e-mail is used to communicate with customers worldwide. For example, Laughing Moon, LLC is a small toymaker in Ventura, California whose customers can browse products on the company’s website. Although mainly selling to individuals who attend craft and art shows in the U.S., Laughing Moon now has customers in Europe due to its web presence (Laughing Competitive Intelligence 11 Moon, LLC, n.d.). O’Melveny and Myers, LLP, a law firm founded in Los Angeles, now has offices in Europe and Asia and a practice that spans the globe (O’Melveny & Myers, n.d.). Franchising “The four stages of e-business development have been defined as presence, interaction, transaction, and transformation” (Grant, 2001). At times, companies are worried about the opportunity and risk of e-business. Since e-business is constantly evolving, projects can be implemented too soon, avenues may not be thoroughly explored, and options that are available may be missed. An experienced leadership team is needed when an organization is attempting to institute e-business. Management must work with the employees to build a strong vision towards the future and execute by adapting quickly to and being risk takers in a constantly changing environment (Richard, 2001). Competitive Intelligence and Espionage Trade secrets A trade secret is any protected information within a company that is not commonly known. Since this information provides an advantage over the competition, unauthorized use could result in loss of profits to an organization. Trade secrets are not registered in the way that patents are, so extreme care must be taken to ensure the confidentiality of this type of information. By sharing trade secrets with competitors, employees or former employees of an organization can disclose guarded information. Limiting the access of employees on a need to know basis and requiring confidentiality and non-disclosure agreements can help protect a company from unauthorized use of trade secrets. Competitive Intelligence 12 Theft One of the most consequential disadvantages in business is “Economic and Industrial Espionage.” (Naef, 2003). Spying on the competition has become a notorious issue in the business market today. It appears that hackers are more of a financial threat than organizations can control. Billions of dollars are lost over the theft of trade secrets from other institutions (Naef, 2003). One example would be the case of Intel versus a previous employee who stole a trade secret from the corporation as he left. “This act is covered under the Economic Espionage Act of 1996.” (Naef, 2003). Fortunately, the former employee did not profit from this theft. Fraud Fraud is a deliberate misrepresentation that causes someone to suffer damages. Fraud is very difficult to prove in a court of law. In order for fraud to be proven, several conditions must be met. The most important is to prove deliberate misrepresentation. The second thing that must be proven is the justifiable or actual reliance on the expertise of the accused. The hardest part of winning a fraud case is proving that the person who suffered damage took appropriate measures to investigate and discover the potential for fraud before he or she invested. Online sabotage The use of computers and the internet have increased the vulnerability of companies through the threat of online sabotage. Attacks on the company’s information systems can come from employees or from outside of the organization. A study conducted by the US Secret Service found that 29% of attacks were from employees and 71% from outsiders (2002). Online sabotage consists of stealing confidential information about the company, accessing private information about customers and employees, deleting files, and planting viruses, worms, and bugs to destroy databases and operating systems. Email systems are also subject to attack. McAfee, an anti-virus Competitive Intelligence 13 company, reported that in the first half of 2005, 16,000 computers were “infected with malicious code” (as cited in Spring, 2005). Telephone and email “Hacking is considered one of the top three methods for obtaining trade secrets, and it is only increasing in popularity” (Robinson, 2003). There are three types of hacking: physical, remote, and system. Physical hacking occurs when an intruder enters the premises and attempts to search for information; remote hacking is going through the internet or network; and system hacking occurs when an authorized system user gains unauthorized administrative privileges. Telephone eavesdropping is another form of corporate espionage. Digital recorders are available that allow hackers to monitor and record fax transmissions. Hackers are also able to record key tones that allow them to decrypt account numbers or passwords (Robinson, 2003). Inside information Investors rely on up-to-date information to make intelligent decisions. The valuable information and its flow are often crucial to the future of many of these organizations. Inside information is held secret and is necessary to the future success of the organization; therefore, the exchange, traffic, and disclosure of such information must be guarded. An insider is an officer of a corporation with equity securities registered under the 1934 Act (Cheeseman, 2004). The 1934 Act requires issuers of securities to register the securities under interstate commerce or the American Stock Exchange (2004). Camera phones Austin (as cited in Guarding the Digital World) states: “We live in the information age and information these days is the currency of commerce.” “Stealing can be as exotic as employees using their camera phones to take Competitive Intelligence 14 pictures of confidential business documents. It can be a software developer putting a back door into a software program that will allow him or her to sabotage the network. It can be as simple as an employee picking up a confidential business plan and walking across the street to the competitor. It really runs the gambit.”(2006). Many companies have taken necessary steps to protect themselves to prevent “corporate espionage and spying” (2006). Training employees on appropriate conduct, increasing and improving security systems and checkpoints, and ratifying company policies seem to be the only defense available. Wiretaps There are several wiretap devices available. “U.S. State Department estimates that there are over 700,000 eavesdropping devices each year.” (The Red Balloon, 2005). This makes it amazingly effortless for rival agencies to operate in an unethical manner by illegally wiretapping the competition. “The Industrial Espionage Act has done little or if anything to deter the rapidly growing rate domestic and foreign competitive intelligence in the U.S.” (The Red Balloon, 2005). Many resources are accessible for corporations and individuals to gain access to classified information and to use this intelligence in a destructive manner. Surveillance Over the years, video surveillance has been used to deter individuals from causing problems on public or private property. “Use of other new and innovative technologies; such as computerized mapping for crime control and non-metallic weapons surveillance, show potential for targeting public video surveillance activities” (Nieto, 1997). Video surveillance is beneficial when attempting to incriminate individuals for wrongdoing on public or private property. If the public is aware of personal or video surveillance, the mood is more mundane than when acts can Competitive Intelligence 15 be performed in private or secrecy. When the chances are greater that video surveillance is being used, the percentages are definitely higher that safety is being addressed (Nieto, 1997). Impacts Positive aspects The field of competitive intelligence is a necessary field of endeavor for large and medium sized organizations. The field allows the organizations to have increased security measures by knowing the trends that other organizations are using to obtain information in their respective markets. As a result of information and research, organizations can obtain useful information through legal channels that allows their organizations to remain competitive or to have a competitive edge in their market. Organizations may also thwart the illegal acquisition of information by other organizations attempting to obtain an edge in the market by acquiring information through illegal practices. Negative ramifications “Ethical choices come routinely to the intelligence analyst, who must decide each day what gets reported to policy makers” (Shane, 2006). Integrity, honesty, and accountability are valued qualities among the people of the world. Unfortunately, the effect of illegal forms of competitive intelligence and espionage leave these qualities entangled in the quagmire they create: lawsuits, grand jury appearances, and massive fines. Protection and Legal Retribution Legislation Domestically, most states have adopted the Uniform Trade Secrets Act which provides civil remedies for trade secret piracy (Cheeseman, 2004). Competitive intelligence may violate federal antitrust laws like the Federal Trade Commission Act that outlaws unfair competition Competitive Intelligence 16 (Nahrstadt, 2005). The Electronic Communications Privacy Act protects e-mail whether in transit or stored on a server. The Economic Espionage Act makes it a federal felony for individuals or businesses to steal trade secrets to give to foreign entities (Silva, 2000). Internationally, trade secrets are protected under treaties and conventions: the United Nations World Intellectual Property Organization (WIPO) and the World Trade Organization’s (WTO) Agreement on Trade-Related Aspects of Intellectual Property Rights (TRIPS) (Cheeseman, 2004). The WTO may hear disputes against nations who fail to protect intellectual property rights within their borders. A nation also has authority to prosecute businesses that commit crimes within its borders or that violate its laws (Cheeseman, 2004). Lawsuits An example of a huge lawsuit is against Westjet airline, who shared critical information on clients with Operations Research firms (Transparen, 2004). It can be assumed that this was not a criminal act. The motive for this lawsuit was that two rivals used the same Operation Research adviser which is a conflict of interest. Conclusion Agency law as well as competitive intelligence and sabotage impact every type of business entity. Laws between principals, agents, and third parties must be respected to avoid destructive legal issues and lawsuits. In the business world, extreme caution must be taken to differentiate between legal competitive intelligence gathering and the illegal aspects of espionage. As the world of e-business continues to expand, programs should be implemented that will protect the company and guard against illegal online activities. While competitive intelligence can help the company reach higher levels of performance and success, espionage and sabotage may destroy it. Competitive Intelligence References Barnes, A.J., Dwarkin, T.M., & Richards, E.L. (2003). Law for business (8th ed.). Burr Ridge, NJ: Irwin/McGraw-Hill. Bailen, E. (n.d.). Corporations and crime. Retrieved March 25, 2006, from: http://articles.chooselaw.com/general/view/Corporations-and-Crime.264.html Bamber, L. (2006). I want to start my own business. Can you give me some tips on how to succeed financially? Chatelaine. (English Edition). Toronto. Vol 79. Iss. 4; p. 229. p.1. Retrieved March 25, 2006, from the Proquest database. Cheeseman, H.R. (2004). Business law (5th ed.). Upper Saddle River, NJ: Prentice Hall. Grant, R. (2001). E-business leadership requires quickness and courage. Retrieved March 27, 2006, from http://www.bizjournals.com/albany/stories/2001/03/05/focus6.html Guarding the digital world. (2006, February 10). Goldstream Gazette. Retrieved March 25, 2006, from the Proquest database. Laughing Moon, LLC. (n.d.). Available from http://www.toymakerscollection.com/ Lewis Chester. (2000). Contractual liability coverage: The complete glossary of insurance. Available from http://www.coverageglossary.com Marrs, S.D. (2000). Inside story on trade secrets [Electronic version]. ABA Journal, 86(10), 77-78. Retrieved March 24, 2006, from EbscoHost database. Many U.S. corporations going mobile. (2000). Retrieved April 5, 2006, from http://member.advisor.com/doc/06746 Mitchell, J.G. (1999). Framing the future: An e-commerce operation. Retrieved 17 Competitive Intelligence 18 April 7, 2006, from http://unpan1.un.org/intradoc/groups/public/documents/APCITY/UNPAN005840.pdf#se arch='definition%20of%20ebusiness%20partnerships' Naef, W. E. (2003). Economic and industrial espionage: A threat to corporate America. Retrieved March 25, 2006, from http://www.iwar.org.uk/infocon/economicespionage.htm Nahrstadt, B.C. (2005). Trade meetings and the antitrust laws: What business competitors need to know about antitrust liability. [Electronic version]. FDCC Quarterly. 55(2), 193-207. Retrieved March 23, 2006, from EbscoHost Database. Neito, M. (1997). Public video surveillance: Is it an effective crime prevention tool? Retrieved April 6, 2006, from www.crestlock.com/Kalatelcctv_2.htm O’Melveny & Myers, LLP. (n.d.). Available from http://www.omm.com/webcode/navigate.asp?nodehandle=519 Robinson, S. W. (2003). Corporate espionage 101. Retrieved March 27, 2006, from http://www.sans.org/rr/whitepapers/engineering/512.php Rushforth, L. T. (1988 - 1999). The Rushforth Firm's Estates Planning Pages. Retrieved April 7, 2006, from, http://www.rushforth.net/advbusin.html Samborn, H.V. (2004). Move over, James Bond [Electronic version]. ABA Journal, 90(7), 24. Retrieved March 23, 2006, from EbscoHost Database. Shane, S. (2006, January 28). An Exotic tool for espionage: Moral compass. New York Times. (Late Edition, East Coast). Retrieved March 25, 2006, from the Proquest database. Silva, J. (2000). Legislative relief sought for corporate espionage cases. [Electronic version]. Competitive Intelligence 19 RCR Wireless News. p. 19(39), 24-26. Retrieved March 23, 2006, from EbscoHost database. Spring, T. (2005). Whose catching the cyber-crooks? PC World. Retrieved March 25, 2006, from: http://www.pcworld.com/news/article/0, aid,122245,00.asp Story, S. E. (n.d.). Franchising your business. Retrieved March 27, 2006, from http://www.kaufmanandcanoles.com/pubTemplates/article.asp?PubCode=258 The red balloon. (2005). Retrieved March 25, 2006, from http://www.tscmvideo.com/index.html Transparen. (2004). Operations research: Avoiding the taint of corporate espionage. Retrieved March 25, 2006, from: http://www.transparen.com/management-consultinggroup/operations-research-airline-scandal US Secret Service. (2002). Insider threat study. Retrieved March 24, 2006, from http://www.secretservice.gov/ntac_its.shtml Zahorsky, D. (2006). Small business information. Available from http://www.sbinformation.about.com